9%
07.10.2014
seq_timeout = 10
08 tcpflags = syn
09 command = /usr/sbin/iptables -A INPUT -s \
%IP% -p tcp --dport 22 -j ACCEPT
10
11 [closeSSH]
12 sequence = 9000
9%
21.07.2011
address = 192.168.1.250 eth0:0
17 vip_nmask = 255.255.255.0
18 port = 80
19 send = "GET / HTTP/1.0\r\n\r\n"
20 expect = "HTTP"
21 use_regex = 0
22 load_monitor = rup
23
9%
10.06.2015
"} )
09
10 # force called programs to english output
11 LANG=C LC_ALL=C
12
13 function die {
14 echo 1>&2 "$*"
15 exit 10
16 }
17
18 function get_display_resolution {
19 local find_display="$1
9%
27.09.2021
ssh ubuntu@52.90.56.122; do sleep 1; done
ssh: connect to host 52.90.56.122 port 22: Connection refused
ssh: connect to host 52.90.56.122 port 22: Connection refused
[ output truncated ]
Welcome
9%
04.10.2018
"data_dir": "/var/consul",
08 "datacenter": "Datacenter-A",
09 "disable_update_check": true,
10 "enable_script_checks": true,
11 "enable_syslog": true,
12 "encrypt": "xxxxxxxxxxxxxx
9%
04.12.2013
3 type rec
4 integer :: x, y, z
5 real :: value
6 end type rec
7
8 integer :: counter
9 integer :: counter_limit
10 integer :: ierr
11
12 type (rec) :: my
9%
20.06.2022
_ADMIN=admin
10 - KEYCLOAK_ADMIN_PASSWORD=SOME_PASSWORD
11 - KC_DB=postgres
12 - KC_DB_URL=jdbc:postgresql://postgres:5432/keycloak
13 - KC_DB_USERNAME=postgres
14 - KC
9%
01.06.2024
* argv[])
08 {
09 long niter = 1000000000;
10 int myid; //holds process's rank id
11 double x,y; //x,y value for the random coordinate
12 int i;
13
9%
15.04.2013
be no question of disabling the legacy algorithm for the time being. However, disabling MD5 signatures is something that you can (and should) do today.
You can enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2
9%
06.10.2019
publisher TEXT,
07 authors MAP,
08 circulation INT,
09 issue TEXT,
10 PRIMARY KEY(publisher, issue, isbn)
11 );
12
13 # INSERT INTO titles(isbn, year, title, publisher, authors, circulation